TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Upgrading a cPanel plugin

56 pointsby showsoveralmost 12 years ago

12 comments

sikhnerdalmost 12 years ago
This is part of what the developer released to fix the security vulnerability disclosed responsibly on WHT [1] tl;dr of that thread by the OP [2] . Beyond the ridiculous response of the developer in the thread, the fix released doesn&#x27;t even fix the issue. Some other security researcher released the root vuln [3] and basically every install of this software is about to be rooted. And that&#x27;s all before the ridiculousness of passing a root password over http, which strips &quot;special characters&quot; that is used to login to your box and upgrade their software. If you read the linked thread, it&#x27;s like a case study on how to NOT respond to a security disclosure.<p>[1] - <a href="http:&#x2F;&#x2F;www.webhostingtalk.com&#x2F;showthread.php?t=1275572" rel="nofollow">http:&#x2F;&#x2F;www.webhostingtalk.com&#x2F;showthread.php?t=1275572</a> [2] - <a href="http:&#x2F;&#x2F;www.webhostingtalk.com&#x2F;showpost.php?p=8727714&amp;postcount=148" rel="nofollow">http:&#x2F;&#x2F;www.webhostingtalk.com&#x2F;showpost.php?p=8727714&amp;postcou...</a> [3] - <a href="http:&#x2F;&#x2F;localhost.re&#x2F;p&#x2F;zamfoo-120-vulnerability" rel="nofollow">http:&#x2F;&#x2F;localhost.re&#x2F;p&#x2F;zamfoo-120-vulnerability</a>
评论 #5888504 未加载
评论 #5888507 未加载
Avalaxyalmost 12 years ago
See this thread for their response: <a href="http:&#x2F;&#x2F;www.webhostingtalk.com&#x2F;showthread.php?t=1275572" rel="nofollow">http:&#x2F;&#x2F;www.webhostingtalk.com&#x2F;showthread.php?t=1275572</a>.<p>I tried submitting it to HN, but I receive an error &quot;stop spamming us, you are wasting your time&quot;. Anyone knows why this is? (I&#x27;m most definitely not a spammer)
评论 #5888384 未加载
评论 #5888391 未加载
showsoveralmost 12 years ago
This is the upgrade procedure for a critical security vulnerability found here: <a href="http:&#x2F;&#x2F;www.webhostingtalk.com&#x2F;showthread.php?t=1275572" rel="nofollow">http:&#x2F;&#x2F;www.webhostingtalk.com&#x2F;showthread.php?t=1275572</a>
评论 #5888331 未加载
bigiainalmost 12 years ago
Errmmm, is that _really_ asking for root ssh credentials over an unencrypted http form?<p>_REALLY?_
评论 #5888211 未加载
评论 #5888186 未加载
aghullalmost 12 years ago
Since the exploit lets you easily root the install, couldn&#x27;t zamfoo just patch all his users machines themselves?<p>That would make about as much sense as everything else they&#x27;ve done....
joshguthriealmost 12 years ago
I guess a real script with &quot;curl zamfoo.com&#x2F;?license=$ZAMFOO_LICENSE&quot; | sh&quot; was too hard so I&#x27;m better off giving my root password to strangers.
评论 #5888707 未加载
tsigoalmost 12 years ago
Plus there&#x27;s this gem [1] about a &quot;kill switch&quot; that disables every single install of the software.<p>&quot;not only that. there is an emergency kill switch. if you release the patch i will pull the switch and no one can use the software. your exploit will not work if i do that. the plugin will become useless until i turn it back on.&quot;<p>[1] <a href="http:&#x2F;&#x2F;www.webhostingtalk.com&#x2F;showpost.php?p=8724954&amp;postcount=17" rel="nofollow">http:&#x2F;&#x2F;www.webhostingtalk.com&#x2F;showpost.php?p=8724954&amp;postcou...</a>
评论 #5890968 未加载
quchenalmost 12 years ago
&quot;Special characters may not work.&quot;<p>I guess we should change our root passwords to &quot;root123&quot; so upgrading becomes easier.
astaralmost 12 years ago
The upgrading process seems easy Just have to send your IP address, root user name, password, and license key through a form...and you can do it through the fast http scheme rather than the slow https.
wildgiftalmost 12 years ago
wouldn&#x27;t it be better to just say that there&#x27;s a specific type of vulnerability, and then explain how long it has been?<p>ultimately, it&#x27;s up to customers and end users to decide if they can tolerate a security hole being open for a few weeks or months. to that end, maybe it&#x27;s better to go down the food chain and look at what hosts are using WHM, and publish that list. end users could see if their provider is exposed.
SimHackeralmost 12 years ago
People who use cpanel should not be allowed near computers.
评论 #5889129 未加载
dansoalmost 12 years ago
1. What is Zamfoo? I&#x27;ve clicked through a few Google results and all I see are references to WHM and various levels of being a &quot;Reseller&quot;. I guess I&#x27;m not irritated by Zamfoo&#x27;s lack of a great About page as I am about the fact that there are still business tech acronyms that I&#x27;ve never encountered before...and I thought mastering &quot;CMS&quot; and &quot;ROI&quot; was good enough<p>2. It seems like this is mostly a one-person shop, with the site owner answering the emails and forum discussions. Ugh, nothing like having to maintain holey software yourself...though obviously, I feel much sorrier for anyone who&#x27;s gotten&#x2F;is getting hacked.
评论 #5889012 未加载